Workspot, Inc. RSA SecurID Ready Implementation Guide. Partner Information. Last Modified: September 16, Product Information Partner Name

Size: px
Start display at page:

Download "Workspot, Inc. RSA SecurID Ready Implementation Guide. Partner Information. Last Modified: September 16, 2013. Product Information Partner Name"

Transcription

1 RSA SecurID Ready Implementation Guide Partner Information Last Modified: September 16, 2013 Product Information Partner Name Web Site Product Name Version & Platform Product Description, Inc. workspot.com for ipad and iphone helps companies improve productivity by securely connecting users to core business applications and data on their personal mobile devices. s patent-pending mobile virtualization solution can be quickly deployed using existing infrastructure. The solution consists of a client application running on a mobile device together with a cloud-based administration console.

2 Solution Summary The Client is a secure mobile virtualization container on the device, which includes a virtual file system and a virtual network. The virtual network provides secure connectivity to the users corporate resources while the virtual file system stores documents downloaded on the device. Control is a cloud-based service console that an IT administrator uses to configure and manage the applications, VPN connection and policies for mobile users. and RSA SecurID leverages RSA SecurID authentication provided by SSL VPN gateway appliances and currently supports the following vendors and products: Cisco Adaptive Security Appliance (ASA) Dell SonicWALL Secure Remote Access (SRA) F5 BIG-IP Access Policy Manager (APM) Juniper Secure Access Series SSL VPN Note: Individual products may not support all features. Links to RSA s Cisco, Dell, F5 and Juniper SSL VPN Implementation Guides can be found in the Appendix of this document. RSA SecurID supported features RSA SecurID Authentication via Native RSA SecurID Protocol RSA SecurID Authentication via RADIUS Protocol On-Demand Authentication via Native SecurID Protocol On-Demand Authentication via RADIUS Protocol RSA Authentication Manager Replica Support Secondary RADIUS Server Support RSA Software Token Supported Features Windows Automation SID800 Automation OS X Automation ios Automation Android Automation File-based Provisioning CT-KIP Provisioning CTF Provisioning No No No No No - 2 -

3 Authentication using RSA SecurID In Control, the administrator defines which SSL VPN gateway the mobile user authenticates and connects to, and defines a security policy to enable RSA SecurID. The VPN gateway must be configured to use the RSA Authentication Manager for authentication. The client will authenticate using RSA SecurID as follows: 1. Control sends a security profile with RSA SecurID enabled to the mobile device. 2. The mobile user initiates a login via the client. 3. The user s credentials, username and passcode are sent to the VPN gateway to authenticate using the RSA Authentication Manager. 4. The RSA Authentication Manager may present authentication challenges associated with the user s account or token state. 5. The user enters responses to the authentication challenges as required. 6. If the credentials are valid, the user will be authenticated by the RSA Authentication Manager and a VPN session is created with the VPN gateway. If the authentication fails, the user is denied access and a session is not established. Control Client 5 SSL VPN Gateway? X 4 6 Authentication Manager - 3 -

4 Partner Product Configuration Before You Begin This section provides instructions for configuring with RSA SecurID Authentication. This document is not intended to suggest optimum installations or configurations. It is assumed that the reader has both working knowledge of all products involved, and the ability to perform the tasks outlined in this section. Administrators should have access to the product documentation for all products in order to install the required components. RSA SecurID authentication for can either be enabled during the Express Setup or after the basic account has been configured. Important: The SSL VPN gateway must be configured to support RSA SecurID authentication before enabling RSA for. Refer to the appropriate RSA Implementation Guide found in the Appendix of this document

5 Procedure Overview Enabling RSA during the Express Setup To enable RSA SecurID during the Control Express Setup, select as shown in Screen 1. Screen 1 Enabling RSA during Express Setup - 5 -

6 Enabling RSA If the Express Setup has already been completed, RSA SecurID can be enabled using Control. First, by adding a new Security Policy, then assigning that policy to the group that will be using SecurID authentication. Refer to screens 2 through 6. Screen 2 Adding a New Security Policy (1 of 2) - 6 -

7 Screen 3 Adding a New Security Policy (2 of 2) - 7 -

8 Screen 4 Assigning the RSA Security Policy to a Group (1 of 3) Screen 5 Assigning the RSA Security Policy to a Group (2 of 3) - 8 -

9 Screen 6 Assigning the RSA Security Policy to a Group (3 of 3) - 9 -

10 Importing a RSA SecurID Software Token into The client supports an integrated token by importing a token into the client. To import a token, obtain either a SDTID file or CT-KIP URL through the RSA Authentication Manager. SDTID files should be converted to CTF format with the RSA tokenconvertor utility using the mobile option. See RSA SecurID Software Token Converter documentation for more information. Note: This procedure is only required if you have a CTF or CT-KIP link and want to import that token into. It is not required if you are using an external physical or software token authenticator. To import a token, click on the CTF or CT-KIP link, on the device where is installed. (Screen 1 of 3) This will launch the Client and import the token; enter the token file password if needed. (Screen 2 of 3) Once the file has been successfully imported, click OK to continue. (Screen 3 of 3)

11 RSA SecurID Authentication After RSA SecurID has been configured using Control, the policy is updated on the mobile device. Any user belonging to the group with RSA is enabled, will be prompted for a RSA SecurID passcode or PIN during authentication, as shown in the following device screens. Note: Your home and application screens will look different from the following examples and will be based on the applications defined in Control. Note: If using an integrated token, the token must be imported into before authenticating. From the home screen, click any application, such as an internal SharePoint site, which requires authentication using the SSL VPN gateway. (Screen 1 of 3)

12 RSA Authentication with External Token To authenticate with a hardware or software token, the user should enter their username, password, and RSA SecurID passcode from the token. Depending on the token configuration, the passcode is typically PIN + token code for a hardware token, or the Passcode shown after the PIN is entered into the software token. (Screen 2 of 3) RSA Authentication with Integrated Token To authenticate with the integrated token, the user should enter their username, password, and RSA SecurID PIN. (Alternate screen 2 of 3) After successful authentication, the application home page is shown, in this example, SharePoint. (Screen 3 of 3)

13 RSA SecurID Authentication Screen Examples Authentication Screens The SecurID authentication screens shown below are with configured for the Cisco ASA. Other supported SSL VPN gateways display similar authentication prompts. System generated new PIN prompts User defined (4-8) alphanumeric PIN

14 Next tokencode

15 Certification Checklist for RSA Authentication Manager Date Tested: September 16, 2013 Certification Environment Product Name Version Information Operating System RSA Authentication Manager 8.0 Virtual appliance Cisco ASA Cisco Adaptive Security Cisco IOS Appliance Software Version 8.0(5) ipad, iphone ios 6.1 RSA SecurID Authentication RSA Native Protocol New PIN Windows OS X Android ios Other Force Authentication After New PIN N/A N/A N/A N/A System-Generated PIN N/A N/A N/A N/A User Defined (4-8 Alphanumeric) N/A N/A N/A N/A User Defined (5-7 Numeric) N/A N/A N/A N/A Deny 4 and 8 Digit PIN N/A N/A N/A N/A Deny Alphanumeric PIN N/A N/A N/A N/A Deny PIN Reuse N/A N/A N/A N/A Passcode 16-Digit Passcode N/A N/A N/A N/A 4-Digit Fixed Passcode N/A N/A N/A N/A Next Tokencode Mode Next Tokencode Mode N/A N/A N/A N/A On-Demand Authentication On-Demand Authentication N/A N/A N/A N/A On-Demand New PIN N/A N/A N/A N/A Load Balancing / Reliability Testing Failover (3-10 Replicas) N/A N/A N/A N/A No RSA Authentication Manager N/A N/A N/A N/A GLS / PAR = Pass = Fail N/A = Not Applicable to Integration

16 Certification Checklist for RSA Authentication Manager RSA Software Token Automation RSA Native Protocol PINless Token Windows OS X Android ios Other Next Tokencode Mode N/A N/A N/A N/A PINpad-style Token Deny Alphabetic PIN N/A N/A N/A N/A Next Tokencode Mode N/A N/A N/A N/A Fob-style Token 16-Character Passcode N/A N/A N/A N/A Alphanumeric PIN N/A N/A N/A N/A Next Tokencode Mode N/A N/A N/A N/A Other Password-Protected Token N/A N/A N/A N/A System-Generated PIN N/A N/A N/A N/A GLS / PAR = Pass = Fail N/A = Not Applicable to Integration

17 Appendix Software Token SDK Integration Details Android ios Other RSA Software Token SDK RSA Software Token SDK Version N/A 1.5 N/A RSA Software Token Data Display Token Serial Number N/A N/A Display Token Expiration Date N/A N/A Number of Tokens Supported N/A 1 N/A Provisioning File-Based N/A No N/A CT-KIP N/A N/A CTF N/A N/A Secured by RSA Certified Implementation Guides Cisco ASA Series Adaptive Security Appliance Dell SonicWALL Secure Remote Access (SRA) F5 Networks BIG-IP Juniper Networks Secure Access SSL VPN -

Lieberman Software. RSA SecurID Ready Implementation Guide. Account Reset Console. Partner Information. Last Modified: March 20 th, 2012

Lieberman Software. RSA SecurID Ready Implementation Guide. Account Reset Console. Partner Information. Last Modified: March 20 th, 2012 RSA SecurID Ready Implementation Guide Last Modified: March 20 th, 2012 Partner Information Product Information Partner Name Web Site Product Name Lieberman Software Corporation www.liebsoft.com Version

More information

Stonesoft Corp. Stonegate Firewall and VPN

Stonesoft Corp. Stonegate Firewall and VPN Stonesoft Corp. Stonegate Firewall and VPN RSA SecurID Ready Implementation Guide Last Modified: February 2, 2011 Partner Information Product Information Partner Name Stonesoft Corp. Web Site www.stonesoft.com

More information

RSA SecurID Ready Implementation Guide

RSA SecurID Ready Implementation Guide RSA SecurID Ready Implementation Guide Partner Information Last Modified: December 18, 2006 Product Information Partner Name Microsoft Web Site http://www.microsoft.com/isaserver Product Name Internet

More information

RSA SecurID Ready Implementation Guide

RSA SecurID Ready Implementation Guide RSA SecurID Ready Implementation Guide Partner Information Last Modified: September 30, 2005 Product Information Partner Name Juniper Networks Web Site www.juniper.net Product Name NetScreen SA Version

More information

RSA SecurID Ready Implementation Guide

RSA SecurID Ready Implementation Guide RSA SecurID Ready Implementation Guide Partner Information Last Modified: December 18, 2006 Product Information Partner Name Microsoft Web Site http://www.microsoft.com/isaserver Product Name Internet

More information

RSA SecurID Software Token 1.0 for Android Administrator s Guide

RSA SecurID Software Token 1.0 for Android Administrator s Guide RSA SecurID Software Token 1.0 for Android Administrator s Guide Contact Information See the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA,

More information

RSA SecurID Software Token 1.3 for iphone and ipad Administrator s Guide

RSA SecurID Software Token 1.3 for iphone and ipad Administrator s Guide RSA SecurID Software Token 1.3 for iphone and ipad Administrator s Guide Contact Information See the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks

More information

IMS Health Secure Outlook Web Access Portal. Quick Setup

IMS Health Secure Outlook Web Access Portal. Quick Setup IMS Health Secure Outlook Web Access Portal Purpose: This service has been developed to allow access to the IMS Health email system for staff that can not access the email system through VPN which is preferred

More information

RSA Authentication Manager 7.1 Security Best Practices Guide. Version 2

RSA Authentication Manager 7.1 Security Best Practices Guide. Version 2 RSA Authentication Manager 7.1 Security Best Practices Guide Version 2 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks

More information

ipad or iphone with Junos Pulse and Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy

ipad or iphone with Junos Pulse and Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy ipad or iphone with Junos Pulse and Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview Arlington

More information

Department of Supply & Services (CIMS) RSA Web Express User Guide v1.2

Department of Supply & Services (CIMS) RSA Web Express User Guide v1.2 Department of Supply & Services (CIMS) RSA Web Express User Guide v1.2 Created: May 22, 2008 Updated: April 23, 2009 The RSA Web Express web express web site automates functions required to deploy hardware

More information

How to integrate RSA ACE Server SecurID Authentication with Juniper Networks Secure Access SSL VPN (SA) with Single Node or Cluster (A/A or A/P)

How to integrate RSA ACE Server SecurID Authentication with Juniper Networks Secure Access SSL VPN (SA) with Single Node or Cluster (A/A or A/P) How to integrate RSA ACE Server SecurID Authentication with Juniper Networks Secure Access SSL VPN (SA) with Single Node or Cluster (A/A or A/P) Scenario # 1: Single Node or Standalone SA... 2 Scenario

More information

SHC Client Remote Access User Guide for Citrix & F5 VPN Edge Client

SHC Client Remote Access User Guide for Citrix & F5 VPN Edge Client SHC Client Remote Access User Guide for Citrix & F5 VPN Edge Client Version 1.1 1/15/2013 This remote access end user reference guide provides an overview of how to install Citrix receiver (a required

More information

Defender 5.7 - Token Deployment System Quick Start Guide

Defender 5.7 - Token Deployment System Quick Start Guide Defender 5.7 - Token Deployment System Quick Start Guide This guide describes how to install, configure and use the Defender Token Deployment System, based on default settings and how to self register

More information

RSA SecurID Ready Implementation Guide

RSA SecurID Ready Implementation Guide RSA SecurID Ready Implementation Guide 1. Partner Information Last Modified: November 18, 2004 Partner Name Web Site Product Name Version & Platform Product Description Product Category Cisco Systems www.cisco.com

More information

How To Use The Syndicate Bank Rsa Security Token For Internet Banking On Pc Or Mac Or Mac (For A Web Browser) For A Long Time (For An Ipad) For Free (For Free) For An Unlimited Time) For Your

How To Use The Syndicate Bank Rsa Security Token For Internet Banking On Pc Or Mac Or Mac (For A Web Browser) For A Long Time (For An Ipad) For Free (For Free) For An Unlimited Time) For Your Syndicate Bank Supply and Commissioning of Two Factor Authentication for Internet with Two Factor Authentication for Bank s Internal Users for Various Applications Desktop based User Manual for using SyndProtect

More information

RSA Authentication Manager 8.1 Help Desk Administrator s Guide

RSA Authentication Manager 8.1 Help Desk Administrator s Guide RSA Authentication Manager 8.1 Help Desk Administrator s Guide Contact Information Go to the RSA corporate website for regional Customer Support telephone and fax numbers: www.emc.com/domains/rsa/index.htm

More information

External Authentication with Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy

External Authentication with Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy External Authentication with Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview Arlington

More information

New Brunswick Internal Services Agency. RSA Self-Service Console User Guide

New Brunswick Internal Services Agency. RSA Self-Service Console User Guide New Brunswick Internal Services Agency RSA Self-Service Console User Guide Version: 1.0 Created: November 27, 2013 Modified: November 27, 2013 Table of Contents Introduction...1 Logging on to the RSA Self-Service

More information

Two-Factor Authentication

Two-Factor Authentication Two-Factor Authentication This document describes SonicWALL s implementation of two-factor authentication for SonicWALL SSL-VPN appliances. This document contains the following sections: Feature Overview

More information

VMware Horizon View for SMS PASSCODE SMS PASSCODE 2014

VMware Horizon View for SMS PASSCODE SMS PASSCODE 2014 VMware Horizon View for SMS PASSCODE SMS PASSCODE 2014 VMware View Radius authentication configuration for SMS PASSCODE With the introduction of RADIUS authentication support in VMware View it is possible

More information

Epic Remote Access for Mobile Devices FAQ and Setup

Epic Remote Access for Mobile Devices FAQ and Setup Epic Remote Access for Mobile Devices FAQ and Setup Frequently Asked Questions: How do I request access to Epic for my mobile device? Which mobile devices are supported? What is the mobile device owner

More information

RSA Authentication Manager 8.1 Help Desk Administrator s Guide. Revision 1

RSA Authentication Manager 8.1 Help Desk Administrator s Guide. Revision 1 RSA Authentication Manager 8.1 Help Desk Administrator s Guide Revision 1 Contact Information Go to the RSA corporate website for regional Customer Support telephone and fax numbers: www.emc.com/domains/rsa/index.htm

More information

RSA Authentication Manager 7.1 Security Best Practices Guide. Version 5

RSA Authentication Manager 7.1 Security Best Practices Guide. Version 5 RSA Authentication Manager 7.1 Security Best Practices Guide Version 5 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks

More information

Deployment Guide Mar-2016 rev. a. Integrating the Array Standalone Client with RSA Token Automation

Deployment Guide Mar-2016 rev. a. Integrating the Array Standalone Client with RSA Token Automation Deployment Guide Mar-2016 rev. a Integrating the Array Standalone Client with RSA Token Automation Table of Contents 1 Introduction... 2 2 Install the RSA SecurID Token Client... 3 3 Import the Token File

More information

Cisco ASA. Implementation Guide. (Version 5.4) Copyright 2011 Deepnet Security Limited. Copyright 2011, Deepnet Security. All Rights Reserved.

Cisco ASA. Implementation Guide. (Version 5.4) Copyright 2011 Deepnet Security Limited. Copyright 2011, Deepnet Security. All Rights Reserved. Cisco ASA Implementation Guide (Version 5.4) Copyright 2011 Deepnet Security Limited Copyright 2011, Deepnet Security. All Rights Reserved. Page 1 Trademarks Deepnet Unified Authentication, MobileID, QuickID,

More information

BlackBerry Universal Device Service. Demo Access. AUTHOR: System4u

BlackBerry Universal Device Service. Demo Access. AUTHOR: System4u Demo Access AUTHOR: System4u BlackBerry Universal Device Service Revisions Date Version Description Author June 26 th 2012 1.0 Roman Přikryl September 25 th 2012 1.5 Revision Roman Přikryl October 5 th

More information

Accessing the Mercy Remote Access Portal (SSL VPN)

Accessing the Mercy Remote Access Portal (SSL VPN) MERCY INFORMATION SECURITY TEAM Accessing the Mercy Remote Access Portal (SSL VPN) In order to access the Sisters of Mercy Remote Access Portal, you will need to complete the following steps. ** Important:

More information

Using VMware Horizon View Client for Android

Using VMware Horizon View Client for Android Using VMware Horizon View Client for Android January 2014 Horizon View This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a

More information

Dell SonicWALL and SecurEnvoy Integration Guide. Authenticating Users Using SecurAccess Server by SecurEnvoy

Dell SonicWALL and SecurEnvoy Integration Guide. Authenticating Users Using SecurAccess Server by SecurEnvoy Dell SonicWALL and SecurEnvoy Integration Guide Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 Merlin House Brunel Road Theale

More information

Ultra-strong authentication to protect network access and assets

Ultra-strong authentication to protect network access and assets Ultra-strong authentication to protect network access and assets ESET Secure Authentication provides powerful authentication to make remote access to the company network and sensitive data safe, but hassle-free.

More information

Remote Access End User Guide (Cisco VPN Client)

Remote Access End User Guide (Cisco VPN Client) Remote Access End User Guide (Cisco VPN Client) Contents 1 INTRODUCTION... 3 2 AUDIENCE... 3 3 CONNECTING TO N3 VPN (N3-12-1) OR EXTENDED VPN CLIENT... 3 4 DISCONNECTING FROM N3 VPN (N3-12-1) AND EXTENDED

More information

Citrix Netscaler Advanced guide for SMS PASSCODE SMS PASSCODE 2014

Citrix Netscaler Advanced guide for SMS PASSCODE SMS PASSCODE 2014 Citrix Netscaler Advanced guide for SMS PASSCODE SMS PASSCODE 2014 Citrix Netscaler Advanced guide for SMS PASSCODE. This document outlines configuration scenarios with SMS PASSCODE and Citrix Netscaler.

More information

RSA SecurID Software Token 4.1 Administrator s Guide

RSA SecurID Software Token 4.1 Administrator s Guide RSA SecurID Software Token 4.1 Administrator s Guide Contact Information See the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA and the RSA logo

More information

Ultra-strong authentication to protect network access and assets

Ultra-strong authentication to protect network access and assets Ultra-strong authentication to protect network access and assets ESET Secure Authentication provides powerful authentication to make remote access to the company network and sensitive data safe, but hassle-free.

More information

RSA SecurID Token User Guide February 12, 2015

RSA SecurID Token User Guide February 12, 2015 RSA SecurID Token User Guide Page i Table of Contents Section I How to request an RSA SecurID token... 1 Section II Setting your RSA SecurID PIN... 6 Section III Setting up PuTTY on your Windows workstation

More information

TechNote. Contents. Introduction. System Requirements. SRA Two-factor Authentication with Quest Defender. Secure Remote Access.

TechNote. Contents. Introduction. System Requirements. SRA Two-factor Authentication with Quest Defender. Secure Remote Access. Secure Remote Access SRA Two-factor Authentication with Quest Defender SonicOS Contents Introduction... 1 System Requirements... 1 Defender Configuration... 2 Dell SonicWALL SRA Configuration... 18 Two-factor

More information

RSA Authentication Manager 7.1 Administrator s Guide

RSA Authentication Manager 7.1 Administrator s Guide RSA Authentication Manager 7.1 Administrator s Guide Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA and the RSA

More information

VMware Virtual Desktop Manager User Authentication Guide

VMware Virtual Desktop Manager User Authentication Guide Technical Note VMware Virtual Desktop Manager User Authentication Guide VMware Virtual Desktop Manager The purpose of this guide is to provide details of user authentication in VMware Virtual Desktop Manager

More information

Logging into Citrix (Epic) using an RSA Soft Token - New RSA User

Logging into Citrix (Epic) using an RSA Soft Token - New RSA User Logging into Citrix (Epic) using an RSA Soft Token - New RSA User Soft Token Installation and Logging into Citrix (Epic) using an RSA Soft Token A. For new RSA users: downloading & importing your RSA Soft

More information

Telstra Mobile Device Management (T MDM) Getting Started Guide

Telstra Mobile Device Management (T MDM) Getting Started Guide Telstra Mobile Device Management (T MDM) Getting Started Guide Welcome Thank you for your interest in T MDM and Welcome! In this guide we will take you through the steps to enrolling your first device

More information

Virtual Desktop and SSL VPN access with OnDemand tokencode. User Guide

Virtual Desktop and SSL VPN access with OnDemand tokencode. User Guide Virtual Desktop and SSL VPN access with OnDemand tokencode User Guide Contents : 1. Quick Start Guide : Access to the Virtual Desktop main page 2 1.1 First authentication... 3 1.2 PIN... 4 1.3 PIN change...

More information

Instructions for Using Secure Email. (SMail) via Outlook Web Access. with an RSA Token

Instructions for Using Secure Email. (SMail) via Outlook Web Access. with an RSA Token Instructions for Using Secure Email (SMail) via Outlook Web Access with an RSA Token Version 4 April 2010 Office of the Associate CIO for IT Support Services United States Department of Energy Requirements

More information

RSA SecurID Software Token Security Best Practices Guide

RSA SecurID Software Token Security Best Practices Guide RSA SecurID Software Token Security Best Practices Guide Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks RSA, the RSA

More information

BYOD How-To Guide. How do I securely deliver my company s applications and data to BYOD?

BYOD How-To Guide. How do I securely deliver my company s applications and data to BYOD? BYOD How-To Guide How do I securely deliver my company s applications and data to BYOD? Table of Contents Harness the power of BYOD with Mobile Workspaces Why BYOD? Enterprise Mobile Requirements Mobile

More information

RSA Authentication Manager 7.1 Basic Exercises

RSA Authentication Manager 7.1 Basic Exercises RSA Authentication Manager 7.1 Basic Exercises Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA and the RSA logo

More information

MRU Secure Remote Access Service (SRAS) External User Guide

MRU Secure Remote Access Service (SRAS) External User Guide MRU Secure Remote Access Service (SRAS) External User Guide The MRU Secure Remote Access Service (SRAS) allows MRU approved vendor and external clients restricted remote access to MRU internal computing

More information

External Authentication with Cisco ASA Authenticating Users Using SecurAccess Server by SecurEnvoy

External Authentication with Cisco ASA Authenticating Users Using SecurAccess Server by SecurEnvoy External Authentication with Cisco ASA Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 Merlin House Brunel Road Theale Reading

More information

MRU Secure Remote Access Service (SRAS) External User Guide

MRU Secure Remote Access Service (SRAS) External User Guide MRU Secure Remote Access Service (SRAS) External User Guide The MRU Secure Remote Access Service (SRAS) allows MRU approved vendors and external clients, restricted remote access to internal computing

More information

RSA Authentication Manager 8.1 Administrator s Guide

RSA Authentication Manager 8.1 Administrator s Guide RSA Authentication Manager 8.1 Administrator s Guide Contact Information Go to the RSA corporate website for regional Customer Support telephone and fax numbers: www.emc.com/domains/rsa/index.htm Trademarks

More information

BIG-IP Access Policy Manager Tech Note for BIG-IP Edge Client App for ios

BIG-IP Access Policy Manager Tech Note for BIG-IP Edge Client App for ios BIG-IP Access Policy Manager Tech Note for BIG-IP Edge Client App for ios 2 OpenTopic TOC Contents What is BIG-IP Edge Client app for ios?... 3 About supported authentication types... 3 About establishing

More information

How to Use Your RSA SecurID Software Token for Windows XP, Vista, or Windows 7 (For ICIS remote access)

How to Use Your RSA SecurID Software Token for Windows XP, Vista, or Windows 7 (For ICIS remote access) 1 How to Use Your RSA SecurID Software Token for Windows XP, Vista, or Windows 7 (For ICIS remote access) San Antonio Community Hospital uses a strong authenticate method for remote access to ICIS. This

More information

Access Your Cisco Smart Storage Remotely Via WebDAV

Access Your Cisco Smart Storage Remotely Via WebDAV Application Note Access Your Cisco Smart Storage Remotely Via WebDAV WebDAV (Web-based Distributed Authoring and Versioning), is a set of extensions to the HTTP(S) protocol that allows a web server to

More information

How To Integrate Watchguard Xtm With Secur Access With Watchguard And Safepower 2Factor Authentication On A Watchguard 2T (V2) On A 2Tv 2Tm (V1.2) With A 2F

How To Integrate Watchguard Xtm With Secur Access With Watchguard And Safepower 2Factor Authentication On A Watchguard 2T (V2) On A 2Tv 2Tm (V1.2) With A 2F External Authentication with Watchguard XTM Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview Arlington Business Park

More information

Establishing two-factor authentication with Cyberoam UTM appliances and HOTPin authentication server from Celestix Networks

Establishing two-factor authentication with Cyberoam UTM appliances and HOTPin authentication server from Celestix Networks Establishing two-factor authentication with Cyberoam UTM appliances and HOTPin authentication server from Celestix Networks Contact Information www.celestix.com Celestix Networks USA Celestix Networks

More information

Deploying iphone and ipad Security Overview

Deploying iphone and ipad Security Overview Deploying iphone and ipad Security Overview ios, the operating system at the core of iphone and ipad, is built upon layers of security. This enables iphone and ipad to securely access corporate services

More information

External Authentication with Citrix Access Gateway Advanced Edition

External Authentication with Citrix Access Gateway Advanced Edition External Authentication with Citrix Access Gateway Advanced Edition Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview Arlington Business Park Theale Reading RG7 4TY Andy Kemshall

More information

USER MANUAL. CTBTO Remote Access VPN using Cisco AnyConnect

USER MANUAL. CTBTO Remote Access VPN using Cisco AnyConnect USER MANUAL CTBTO Remote Access VPN using Cisco AnyConnect 1 Table of Contents I. Purpose... 4 II. Scope... 4 III. Definitions and Acronyms... 4 IV. Background... 5 V. Requirements... 5 VI. General Installation

More information

External authentication with Fortinet Fortigate UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy

External authentication with Fortinet Fortigate UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy External authentication with Fortinet Fortigate UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview Arlington

More information

Establishing two-factor authentication with Check Point and HOTPin authentication server from Celestix Networks

Establishing two-factor authentication with Check Point and HOTPin authentication server from Celestix Networks Establishing two-factor authentication with Check Point and HOTPin authentication server from Celestix Networks Contact Information www.celestix.com Celestix Networks USA Celestix Networks EMEA Celestix

More information

External Authentication with Cisco VPN 3000 Concentrator Authenticating Users Using SecurAccess Server by SecurEnvoy

External Authentication with Cisco VPN 3000 Concentrator Authenticating Users Using SecurAccess Server by SecurEnvoy External Authentication with Cisco VPN 3000 Concentrator Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview Arlington

More information

Sophos UTM. Remote Access via SSL Configuring Remote Client

Sophos UTM. Remote Access via SSL Configuring Remote Client Sophos UTM Remote Access via SSL Configuring Remote Client Product version: 9.300 Document date: Tuesday, October 14, 2014 The specifications and information in this document are subject to change without

More information

Establishing two-factor authentication with Barracuda NG Firewall and HOTPin authentication server from Celestix Networks

Establishing two-factor authentication with Barracuda NG Firewall and HOTPin authentication server from Celestix Networks Establishing two-factor authentication with Barracuda NG Firewall and HOTPin authentication server from Celestix Networks Contact Information www.celestix.com Celestix Networks USA Celestix Networks EMEA

More information

Dell SonicWALL SRA 7.5 Citrix Access

Dell SonicWALL SRA 7.5 Citrix Access Dell SonicWALL SRA 7.5 Citrix Access Document Scope This document describes how to configure and use Citrix bookmarks to access Citrix through Dell SonicWALL SRA 7.5. It also includes information about

More information

Remote Desktop Gateway. Accessing a Campus Managed Device (Windows Only) from home.

Remote Desktop Gateway. Accessing a Campus Managed Device (Windows Only) from home. Remote Desktop Gateway Accessing a Campus Managed Device (Windows Only) from home. Contents Introduction... 2 Quick Reference... 2 Gateway Setup - Windows Desktop... 3 Gateway Setup Windows App... 4 Gateway

More information

ATTENTION: End users should take note that Main Line Health has not verified within a Citrix

ATTENTION: End users should take note that Main Line Health has not verified within a Citrix Subject: Citrix Remote Access using PhoneFactor Authentication ATTENTION: End users should take note that Main Line Health has not verified within a Citrix environment the image quality of clinical cal

More information

Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are.

Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are. Two Factor Authentication Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are. For example, one method currently utilized within

More information

Two Factor Authentication in SonicOS

Two Factor Authentication in SonicOS Two Factor Authentication in SonicOS 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential damage

More information

Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication

Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication This document serves as a How To reference guide for employees to execute the following MFA tasks: 1.

More information

To set up your Android with Good for Enterprise:

To set up your Android with Good for Enterprise: To set up your Android with Good for Enterprise: 1. Your IT administrator will send you a message with your email address, a PIN (and expiration date, if applicable), and a URL address. 2. Make sure your

More information

Workspot Configuration Guide for the Cisco Adaptive Security Appliance

Workspot Configuration Guide for the Cisco Adaptive Security Appliance Workspot Configuration Guide for the Cisco Adaptive Security Appliance Workspot, Inc. 1/27/2015 Cisco ASA and Workspot Overview The Cisco Adaptive Security Appliance (ASA) provides organizations with secure,

More information

RSA SecurID Certified Administrator (RSA Authentication Manager 8.0) Certification Examination Study Guide

RSA SecurID Certified Administrator (RSA Authentication Manager 8.0) Certification Examination Study Guide RSA SecurID Certified Administrator (RSA Authentication Manager 8.0) Certification Examination Study Guide Introduction The RSA SecurID Certified Administrator (CA) examination is based on the critical

More information

SonicWALL Mobile Connect. Mobile Connect for OS X 3.0. User Guide

SonicWALL Mobile Connect. Mobile Connect for OS X 3.0. User Guide SonicWALL Mobile Connect Mobile Connect for OS X 3.0 User Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION

More information

Check Point FW-1/VPN-1 NG/FP3

Check Point FW-1/VPN-1 NG/FP3 Check Point FW-1/VPN-1 NG/FP3 Implementation Guide Copyright Copyright 2006, CRYPTOCard Corp. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval

More information

Using VMware Horizon View Client for ios

Using VMware Horizon View Client for ios Using VMware Horizon View Client for ios January 2014 Horizon View This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

Integration Guide. Swivel Secure Authentication

Integration Guide. Swivel Secure Authentication Integration Guide Swivel Secure Authentication Revised: 21 February 2016 About This Guide Guide Type Documented Integration WatchGuard or a Technology Partner has provided documentation demonstrating integration

More information

External Authentication with Netscreen 25 Remote VPN Authenticating Users Using SecurAccess Server by SecurEnvoy

External Authentication with Netscreen 25 Remote VPN Authenticating Users Using SecurAccess Server by SecurEnvoy External Authentication with Netscreen 25 Remote VPN Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview Arlington Business

More information

Cisco VPN Concentrator Implementation Guide

Cisco VPN Concentrator Implementation Guide Cisco VPN Concentrator Implementation Guide Copyright Copyright 2006, CRYPTOCard Corp. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval

More information

A Guide to New Features in Propalms OneGate 4.0

A Guide to New Features in Propalms OneGate 4.0 A Guide to New Features in Propalms OneGate 4.0 Propalms Ltd. Published April 2013 Overview This document covers the new features, enhancements and changes introduced in Propalms OneGate 4.0 Server (previously

More information

Compiled By: Chris Presland v1.0. 29 th September. Revision History Phil Underwood v1.1

Compiled By: Chris Presland v1.0. 29 th September. Revision History Phil Underwood v1.1 Compiled By: Chris Presland v1.0 Date 29 th September Revision History Phil Underwood v1.1 This document describes how to integrate Checkpoint VPN with SecurEnvoy twofactor Authentication solution called

More information

Accessing the Media General SSL VPN

Accessing the Media General SSL VPN Launching Applications and Mapping Drives Remote Desktop Outlook Launching Web Applications Full Access VPN Note: To access the Media General VPN, anti-virus software must be installed and running on your

More information

External Authentication with Citrix Secure Gateway - Presentation server Authenticating Users Using SecurAccess Server by SecurEnvoy

External Authentication with Citrix Secure Gateway - Presentation server Authenticating Users Using SecurAccess Server by SecurEnvoy External Authentication with Citrix Secure Gateway - Presentation server Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210

More information

ipad in Business Security

ipad in Business Security ipad in Business Security Device protection Strong passcodes Passcode expiration Passcode reuse history Maximum failed attempts Over-the-air passcode enforcement Progressive passcode timeout Data security

More information

WHAT IS VIRTUAL DESKTOP? WHAT YOU NEED LOG IN TO VIRTUAL DESKTOP SET UP CITRIX RECEIVER REMOTE ACCESS GUIDE

WHAT IS VIRTUAL DESKTOP? WHAT YOU NEED LOG IN TO VIRTUAL DESKTOP SET UP CITRIX RECEIVER REMOTE ACCESS GUIDE WHAT IS VIRTUAL DESKTOP? Virtual Desktop is an online environment that allows you to access NSF applications and a virtual desktop that mimics a Windows 7 environment. You can use Virtual Desktop to use

More information

RSA Authentication Manager 8.1 Planning Guide. Revision 1

RSA Authentication Manager 8.1 Planning Guide. Revision 1 RSA Authentication Manager 8.1 Planning Guide Revision 1 Contact Information Go to the RSA corporate website for regional Customer Support telephone and fax numbers: www.emc.com/domains/rsa/index.htm Trademarks

More information

RSA Authentication Manager 7.1 Administrator s Guide

RSA Authentication Manager 7.1 Administrator s Guide RSA Authentication Manager 7.1 Administrator s Guide Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA and the RSA

More information

Administering Jive Mobile Apps

Administering Jive Mobile Apps Administering Jive Mobile Apps Contents 2 Contents Administering Jive Mobile Apps...3 Configuring Jive for Android and ios... 3 Native Apps and Push Notifications...4 Custom App Wrapping for ios... 5 Native

More information

iphone in Business How-To Setup Guide for Users

iphone in Business How-To Setup Guide for Users iphone in Business How-To Setup Guide for Users iphone is ready for business. It supports Microsoft Exchange ActiveSync, as well as standards-based services, delivering email, calendars, and contacts over

More information

Email setup information for most domains hosted with InfoRailway.

Email setup information for most domains hosted with InfoRailway. Email setup information for most domains hosted with InfoRailway. Incoming server (POP3): pop.secureserver.net port 995 (SSL) Incoming server (IMAP): imap.secureserver.net port 993 (SSL) Outgoing server

More information

RSA Security. RSA, RC2, RC4, RC5, MD5 AES RC6 PKCS RSA Keon PKI. RSA BSAFE 5 Web. RSA SecurID 4000

RSA Security. RSA, RC2, RC4, RC5, MD5 AES RC6 PKCS RSA Keon PKI. RSA BSAFE 5 Web. RSA SecurID 4000 RSA Security RSA, RC2, RC4, RC5, MD5 AES RC6 PKCS RSA Keon PKI RSA BSAFE 5 Web RSA SecurID 4000 EMC Security Strategy 1 Assess Risk EMC Infoscape Discovery Solutions EMC TS Security Practice EMC Services

More information

Deploying iphone and ipad Virtual Private Networks

Deploying iphone and ipad Virtual Private Networks Deploying iphone and ipad Virtual Private Networks Secure access to private corporate networks is available on iphone and ipad using established industry-standard virtual private network (VPN) protocols.

More information

Mobile Access Software Blade

Mobile Access Software Blade Mobile Access Software Blade Dimension Data BYOD event Jeroen De Corel SE BeLux 2012 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved. 2012 Check Point Software Technologies Ltd.

More information

Global VPN Client Getting Started Guide

Global VPN Client Getting Started Guide Global VPN Client Getting Started Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential

More information

Remote Desktop Connection Setup at King s College in Wilkes-Barre, PA

Remote Desktop Connection Setup at King s College in Wilkes-Barre, PA Remote Desktop Connection Setup at King s College in Wilkes-Barre, PA Remote Desktop connections are granted to King s Staff only. Students do not have desktop (office) machines on campus, thus no desktop

More information

This document shows new Citrix users how to set up and log in to their Citrix account.

This document shows new Citrix users how to set up and log in to their Citrix account. Citrix Set up Set up and Log in to Citrix Objective: This document shows new Citrix users how to set up and log in to their Citrix account. Procedure This document shows you how to set up and log in to

More information

Note that if at any time during the setup process you are asked to login, click either Cancel or Work Offline depending upon the prompt.

Note that if at any time during the setup process you are asked to login, click either Cancel or Work Offline depending upon the prompt. USC Marshall School of Business Academic Information Services Configuring Outlook 2010 RPC Over HTTP Protocol For Windows 7 Home Computers or Wireless Laptops The steps in this document cover how to configure

More information

INTEGRATION GUIDE. DIGIPASS Authentication for Juniper SSL-VPN

INTEGRATION GUIDE. DIGIPASS Authentication for Juniper SSL-VPN INTEGRATION GUIDE DIGIPASS Authentication for Juniper SSL-VPN Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO Data

More information

Configuring SSL VPN on the Cisco ISA500 Security Appliance

Configuring SSL VPN on the Cisco ISA500 Security Appliance Application Note Configuring SSL VPN on the Cisco ISA500 Security Appliance This application note describes how to configure SSL VPN on the Cisco ISA500 security appliance. This document includes these

More information

Advanced Configuration Steps

Advanced Configuration Steps Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings

More information

UBC Digital Signage Service: CoolSign 5.0 Initial Set- up Guide

UBC Digital Signage Service: CoolSign 5.0 Initial Set- up Guide UBC Digital Signage Service: CoolSign 5.0 Initial Set- up Guide With the latest release of the CoolSign software (version 5.02) we have changed the way that users connect to the CoolSign Network Manager

More information